SlideShare a Scribd company logo
1 of 17
Improve ROI on Security and Compliance Management June 7, 2010
How Much It Cost To Be Secure? First Level Third Level Second Level *Calculated on 2080 Hours/Year Deeper it goes,  longer is the Exposure and the  associated Risk Cost Standard IT Security Model Resource Type Ownership % Hourly Cases Hourly Cost* Help Desk & Service Desk Low Skill Resources High Turnaround 68% 4 22$ IT Professionals Platform Specific In-House Personnel 26% 1,5 44$ Security Officers Technology Specific Mostly External 6% 0,13 112$
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],And Why?
Goal of IT Management Become an Efficient Business Enabler Operational Efficiency Business Enablement Goal: Cost Effective with Optimized Service Delivery Sub-Optimal: Cost-Centric and Tactical with Marginal Services Current State: Expensive and Tactical with Limited Perceived Value Sub-Optimal: Aligned To Business Goals But Expensive Efficient Business Enabler A Low Cost Provider C Expensive Business Enabler B Low Value Provider D
Management’s Dilemma Operational Efficiency vs. Business Enablement Significant up-front investments and the need for profound changes  jeopardize or delay expected cost reductions . Off-shoring and outsourcing, combined with little investment in processes, often  forsake agility and business enablement . “ The Cost Cutter” “ The Framework Adopter” Operational Efficiency Business Enablement Operational Efficiency Business Enablement
A Different Approach IT Process Automation Provides a Direct Route to Improve Efficiency IT Process Automation  enables you to: 1 Reduce Inefficiencies from Current Security Mgmt Tools ,[object Object],[object Object],2 Integrate Tools within IT Security and Operations 3 ,[object Object],[object Object],Integrate the Business into IT Security Mgmt Processes ,[object Object],[object Object],[object Object],[object Object],[object Object],Operational Efficiency Business Enablement 1 2 3
The NetIQ Security Vision Audit Monitor Control ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Monitor and Manage User Activity Control and Audit Configuration Manage and Enforce Change Control Goals Challenges Our Approach NetIQ Solution NetIQ Solution NetIQ Solution All of those through Automation
Control and Audit Configuration Primary Goal: Protect systems, applications and data in accordance with their business value and satisfy compliance mandates NetIQ Delivers Real-time event correlation reduces alert volumes while highlighting critical events, improving incident management while reducing costs. TRACE™ technology delivers log management, protects the chain of custody, and provides trend analysis and forensics to meet evolving mandates. Powerful auditing of user activity and access controls helps meet compliance mandates and address both inside and outside threats. Effective detection at both the host and network level provides better protection of corporate data and demonstrable oversight of change controls. What's Needed Event Correlation and Analysis Log Management and Forensics Access Control and User Monitoring Change and Threat Detection Challenges What's Needed 1. Security events and alerts often overwhelm security staff, inhibiting effective security incident management. Event Correlation and Analysis 2. Evolving mandates require more than simple log consolidation, to encompass integrity of data, chain of custody, and forensic reporting. Log Management and Forensics 3. Effective protection of corporate data is dependent on user activity monitoring, which is often inhibited by native capabilities. Access Control and User Monitoring 4. Intrusion detection and log monitoring are insufficient to meet the evolving mandates for data protection and change control. Change and Threat Detection
Monitor and Manage User Activity Primary Goal: Maintain the infrastructure, applications, user accounts, and security per business requirements NetIQ Delivers A prevention-oriented, proxy-based administration solution delivers higher availability than that of system-wide backup and restoration. Non-hierarchical, rules-based delegation simplifies safely granting privileges to users. Automated tasks triggered by events streamline routine administrative tasks, saving time and improving service. Automation and repeatability, along with Active Directory and Unix users optimization, assures business availability and satisfied end users. What's Needed Prevention and Recovery Delegated Administration Administrator Task Automation Migration and Optimization Challenges What's Needed 1. Administrative errors and malicious acts threaten the integrity and reliability of systems and services. Prevention and Recovery 2. Native tools make it impractical to enable non-administrators to make routine or low-risk changes. Delegated Administration 3. Manual, routine tasks often consume valuable skilled resources. Administrator Task Automation 4. Diversity, complexity and emerging technologies increase the time to deploy and operate systems management tools. Migration and Optimization
Manage and Enforce Change Control Primary Goal: Real time enforcement of an organization policy throughout the different layers of the IT infrastructure. Without stopping the services operations  CalCom Delivers Automated Process for Real Time Policies Enforcement within the different IT Layers, not stopping the normal operations An extensible library with hundreds of Policy Process Protection Rules covering OSs, Applications, Users Behavior, Network Connections  Learning Mode to understand how and element should behave. Unparalleled capabilities in Monitoring, Auditing, Access and Change control  Built-in reports, Regulatory Compliance Reports, Policy Center © – Gap Analysis Report and Compliance Dashboard © What's Needed Hardening Solutions that doesn’t harm or stop the Services Operations Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access Easily p rovide Real Time Policies monitoring and implementation Unparalleled reporting capabilities  on regulatory compliance Challenges What's Needed 1. Real time enforcement of an organization policies on the IT Infrastructure layers, without harming the Services Operation Hardening Solutions that doesn’t harm or stop the Services Operations 2. Protect and enforce the organization’s Policy Processes through verifying the User behavior Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access 3. Monitor, alert and prevent policies break, rolling back to any change of the hardened element following the Policies Easily p rovide Real Time Policies monitoring and implementation 4. Be able to produce a wide range of regulatory reports, gap analysis, what if analysis and compliance dashboard Unparalleled reporting capabilities  on regulatory compliance
All of Those Through Automation Workflow Automation Engine NetIQ Products Message Bus, Resource Model, CMDB 3 rd  Party Best-of-Breed products Run Books (Event Correlation, Fault Recovery, Routine Server Restarts, etc. ) Processes (ITIL Incident Management, Change Management, DR testing, etc.) Correlation Engine AM SM/CG SCM DRA SCOM HPOM Remedy Smarts Adapters Bi-directional data collection and control Activity Libraries Workflow building blocks that control other tools Process Templates Provides built-in knowledge Presentation Layer Consoles tailored to specific users Independent Engines Allow data processing scalability Resource Mgmt DB  Normalizes data from diverse tools Ops Console Config Console Reports … …
At The End This is What Really Counts
Real World Example On Self Password Reset
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],The Cast and The Crew
Total Economic Impact ROI and Payback Period for NetIQ IT Security Process Automation ,[object Object],[object Object],F ORRESTER ® Summary financial results Original estimate Risk-adjusted ROI 150% 141% Payback period  (yrs) 1.1 1.2 Total Benefits  (PV) $1,232,563 $1,192,083 Total costs  (PV) ($493,847) ($495,549) Total  (NPV) $738,716 $696,534
Next Steps with NetIQ & CalCom © 2010 NetIQ Corporation. All rights reserved. Your Need Action Items Learn More about IT Process Automation ,[object Object],[object Object],[object Object],Validate Our  Approach ,[object Object],[object Object],[object Object],Build a Business Case for NetIQ ,[object Object],[object Object],[object Object],Assess NetIQ for a Technical Fit ,[object Object],[object Object],[object Object],Prepare for  IT Process Automation ,[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologiesSalih Islam
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructurepramod_kmr73
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and controlKashif Rana ACCA
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPsJayesh Daga
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1Cheng Olayvar
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditingDamilola Mosaku
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubKaushal Trivedi
 
Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...Vyom Labs
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Managementicomply
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?VISTA InfoSec
 
Information System audit
Information System auditInformation System audit
Information System auditPratapchandra
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties SolutionsAhmed Abdul Hamed
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOXMahesh Patwardhan
 
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsAMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsIvanti
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Yasir Khan
 

What's hot (20)

It audit methodologies
It audit methodologiesIt audit methodologies
It audit methodologies
 
Audit of it infrastructure
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
 
Information systems audit and control
Information systems audit and controlInformation systems audit and control
Information systems audit and control
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
3c 2 Information Systems Audit
3c   2   Information Systems Audit3c   2   Information Systems Audit
3c 2 Information Systems Audit
 
ITGC audit of ERPs
ITGC audit of ERPsITGC audit of ERPs
ITGC audit of ERPs
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
CIS Audit Lecture # 1
CIS Audit Lecture # 1CIS Audit Lecture # 1
CIS Audit Lecture # 1
 
Introduction to it auditing
Introduction to it auditingIntroduction to it auditing
Introduction to it auditing
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...Managing IT Infrastructure And Applications Proactively For Performance And U...
Managing IT Infrastructure And Applications Proactively For Performance And U...
 
Software Asset Management
Software Asset ManagementSoftware Asset Management
Software Asset Management
 
IS audit checklist
IS audit checklistIS audit checklist
IS audit checklist
 
What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?What is a Firewall Risk Assessment?
What is a Firewall Risk Assessment?
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
Information System audit
Information System auditInformation System audit
Information System audit
 
Segregation of Duties Solutions
Segregation of Duties SolutionsSegregation of Duties Solutions
Segregation of Duties Solutions
 
IT Control Objectives for SOX
IT Control Objectives for SOXIT Control Objectives for SOX
IT Control Objectives for SOX
 
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security CrossroadsAMB410: ITxM: The ITAM, ITSM, and Security Crossroads
AMB410: ITxM: The ITAM, ITSM, and Security Crossroads
 
Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2Information System Architecture and Audit Control Lecture 2
Information System Architecture and Audit Control Lecture 2
 

Viewers also liked

NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITILmbmobile
 
Pirates Boot Camp 1st
Pirates Boot Camp 1st Pirates Boot Camp 1st
Pirates Boot Camp 1st 영일 송
 
Vto 13 December 2010
Vto 13 December 2010Vto 13 December 2010
Vto 13 December 2010MartijnZ1973
 
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02Luisa Fernanda
 
Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summarypejansen
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summarypejansen
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 reviewpejansen
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 reviewpejansen
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 reviewpejansen
 
Chapter 8 review
Chapter 8 reviewChapter 8 review
Chapter 8 reviewpejansen
 
Chapter 9 review
Chapter 9 reviewChapter 9 review
Chapter 9 reviewpejansen
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 reviewpejansen
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 reviewpejansen
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summarypejansen
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summarypejansen
 
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodologyエスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodologyNozomi Ikeya
 
ROVINE CONTEMPORANEE - Serena Previtali
ROVINE CONTEMPORANEE - Serena PrevitaliROVINE CONTEMPORANEE - Serena Previtali
ROVINE CONTEMPORANEE - Serena PrevitaliSerena Previtali
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1pejansen
 
Anatomi publikasi internasional
Anatomi publikasi internasionalAnatomi publikasi internasional
Anatomi publikasi internasionalSaldy Yusuf
 

Viewers also liked (20)

NetIQ approach to ITIL
NetIQ approach to ITILNetIQ approach to ITIL
NetIQ approach to ITIL
 
Pirates Boot Camp 1st
Pirates Boot Camp 1st Pirates Boot Camp 1st
Pirates Boot Camp 1st
 
Vto 13 December 2010
Vto 13 December 2010Vto 13 December 2010
Vto 13 December 2010
 
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
Tenthingsivelearnedaboutdrupal 120130164528-phpapp02
 
Chapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summaryChapter 10, 11 and 12 summary
Chapter 10, 11 and 12 summary
 
Chapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summaryChapter 4, 6, and 7 summary
Chapter 4, 6, and 7 summary
 
Chapter10 review
Chapter10 reviewChapter10 review
Chapter10 review
 
Chapter 3 review
Chapter 3 reviewChapter 3 review
Chapter 3 review
 
Chapter 6 review
Chapter 6 reviewChapter 6 review
Chapter 6 review
 
Chapter 8 review
Chapter 8 reviewChapter 8 review
Chapter 8 review
 
Chapter 9 review
Chapter 9 reviewChapter 9 review
Chapter 9 review
 
Chapter 4 review
Chapter 4 reviewChapter 4 review
Chapter 4 review
 
Chapter 5 review
Chapter 5 reviewChapter 5 review
Chapter 5 review
 
Chapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summaryChapter 13, 14 and 15 summary
Chapter 13, 14 and 15 summary
 
Chapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summaryChapter 5, 8 and 9 summary
Chapter 5, 8 and 9 summary
 
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodologyエスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
エスノメソドロジーの展開におけるシュッツの解釈をめぐって Different understanding Schutz in ethnomethodology
 
ROVINE CONTEMPORANEE - Serena Previtali
ROVINE CONTEMPORANEE - Serena PrevitaliROVINE CONTEMPORANEE - Serena Previtali
ROVINE CONTEMPORANEE - Serena Previtali
 
Discussion week 1
Discussion week 1Discussion week 1
Discussion week 1
 
Julian assange
Julian assangeJulian assange
Julian assange
 
Anatomi publikasi internasional
Anatomi publikasi internasionalAnatomi publikasi internasional
Anatomi publikasi internasional
 

Similar to Automating Security and Compliance Management to Improve ROI

IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Software India
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xguest879489
 
Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006guest879489
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xguest879489
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industryHappiest Minds Technologies
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesGrace Stone
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfaotmp2600
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1dGene Kim
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...NetIQ
 
Performance measurement and exception management in investment processing
Performance measurement and exception management in investment processingPerformance measurement and exception management in investment processing
Performance measurement and exception management in investment processingNIIT Technologies
 

Similar to Automating Security and Compliance Management to Improve ROI (20)

IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
IBM Solutions Connect 2013 - Increase Efficiency by Automating IT Asset & Ser...
 
Kiran_CV
Kiran_CVKiran_CV
Kiran_CV
 
Unit Iii
Unit IiiUnit Iii
Unit Iii
 
InsiderAttack_p3.ppt
InsiderAttack_p3.pptInsiderAttack_p3.ppt
InsiderAttack_p3.ppt
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
 
Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006Sun Managed Operations Customer Presentation,09 20 2006
Sun Managed Operations Customer Presentation,09 20 2006
 
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8xSun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
Sun Managed Operations Customer Presentation,09 20 2006.Star Impress 8x
 
It Audit And Forensics
It Audit And ForensicsIt Audit And Forensics
It Audit And Forensics
 
ITIL Implementation – Value addition to the IT industry
 ITIL Implementation – Value addition to the IT industry ITIL Implementation – Value addition to the IT industry
ITIL Implementation – Value addition to the IT industry
 
Benefits of network monitoring for Businesses
Benefits of network monitoring for BusinessesBenefits of network monitoring for Businesses
Benefits of network monitoring for Businesses
 
Why Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdfWhy Regular Audits are Necessary in IT Asset Management.pdf
Why Regular Audits are Necessary in IT Asset Management.pdf
 
2010 06 gartner avoiding audit fatigue in nine steps 1d
2010 06 gartner   avoiding audit fatigue in nine steps 1d2010 06 gartner   avoiding audit fatigue in nine steps 1d
2010 06 gartner avoiding audit fatigue in nine steps 1d
 
An IT Governance program
An IT Governance programAn IT Governance program
An IT Governance program
 
Practical IT auditing
Practical IT auditingPractical IT auditing
Practical IT auditing
 
Mark Norton (Idiom Limited)
Mark Norton (Idiom Limited)Mark Norton (Idiom Limited)
Mark Norton (Idiom Limited)
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...From reactive to automated reducing costs through mature security processes i...
From reactive to automated reducing costs through mature security processes i...
 
Asset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity CurveAsset Management: Climbing the Asset Maturity Curve
Asset Management: Climbing the Asset Maturity Curve
 
Performance measurement and exception management in investment processing
Performance measurement and exception management in investment processingPerformance measurement and exception management in investment processing
Performance measurement and exception management in investment processing
 

Recently uploaded

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 

Automating Security and Compliance Management to Improve ROI

  • 1. Improve ROI on Security and Compliance Management June 7, 2010
  • 2. How Much It Cost To Be Secure? First Level Third Level Second Level *Calculated on 2080 Hours/Year Deeper it goes, longer is the Exposure and the associated Risk Cost Standard IT Security Model Resource Type Ownership % Hourly Cases Hourly Cost* Help Desk & Service Desk Low Skill Resources High Turnaround 68% 4 22$ IT Professionals Platform Specific In-House Personnel 26% 1,5 44$ Security Officers Technology Specific Mostly External 6% 0,13 112$
  • 3.
  • 4. Goal of IT Management Become an Efficient Business Enabler Operational Efficiency Business Enablement Goal: Cost Effective with Optimized Service Delivery Sub-Optimal: Cost-Centric and Tactical with Marginal Services Current State: Expensive and Tactical with Limited Perceived Value Sub-Optimal: Aligned To Business Goals But Expensive Efficient Business Enabler A Low Cost Provider C Expensive Business Enabler B Low Value Provider D
  • 5. Management’s Dilemma Operational Efficiency vs. Business Enablement Significant up-front investments and the need for profound changes jeopardize or delay expected cost reductions . Off-shoring and outsourcing, combined with little investment in processes, often forsake agility and business enablement . “ The Cost Cutter” “ The Framework Adopter” Operational Efficiency Business Enablement Operational Efficiency Business Enablement
  • 6.
  • 7.
  • 8. Control and Audit Configuration Primary Goal: Protect systems, applications and data in accordance with their business value and satisfy compliance mandates NetIQ Delivers Real-time event correlation reduces alert volumes while highlighting critical events, improving incident management while reducing costs. TRACE™ technology delivers log management, protects the chain of custody, and provides trend analysis and forensics to meet evolving mandates. Powerful auditing of user activity and access controls helps meet compliance mandates and address both inside and outside threats. Effective detection at both the host and network level provides better protection of corporate data and demonstrable oversight of change controls. What's Needed Event Correlation and Analysis Log Management and Forensics Access Control and User Monitoring Change and Threat Detection Challenges What's Needed 1. Security events and alerts often overwhelm security staff, inhibiting effective security incident management. Event Correlation and Analysis 2. Evolving mandates require more than simple log consolidation, to encompass integrity of data, chain of custody, and forensic reporting. Log Management and Forensics 3. Effective protection of corporate data is dependent on user activity monitoring, which is often inhibited by native capabilities. Access Control and User Monitoring 4. Intrusion detection and log monitoring are insufficient to meet the evolving mandates for data protection and change control. Change and Threat Detection
  • 9. Monitor and Manage User Activity Primary Goal: Maintain the infrastructure, applications, user accounts, and security per business requirements NetIQ Delivers A prevention-oriented, proxy-based administration solution delivers higher availability than that of system-wide backup and restoration. Non-hierarchical, rules-based delegation simplifies safely granting privileges to users. Automated tasks triggered by events streamline routine administrative tasks, saving time and improving service. Automation and repeatability, along with Active Directory and Unix users optimization, assures business availability and satisfied end users. What's Needed Prevention and Recovery Delegated Administration Administrator Task Automation Migration and Optimization Challenges What's Needed 1. Administrative errors and malicious acts threaten the integrity and reliability of systems and services. Prevention and Recovery 2. Native tools make it impractical to enable non-administrators to make routine or low-risk changes. Delegated Administration 3. Manual, routine tasks often consume valuable skilled resources. Administrator Task Automation 4. Diversity, complexity and emerging technologies increase the time to deploy and operate systems management tools. Migration and Optimization
  • 10. Manage and Enforce Change Control Primary Goal: Real time enforcement of an organization policy throughout the different layers of the IT infrastructure. Without stopping the services operations CalCom Delivers Automated Process for Real Time Policies Enforcement within the different IT Layers, not stopping the normal operations An extensible library with hundreds of Policy Process Protection Rules covering OSs, Applications, Users Behavior, Network Connections Learning Mode to understand how and element should behave. Unparalleled capabilities in Monitoring, Auditing, Access and Change control Built-in reports, Regulatory Compliance Reports, Policy Center © – Gap Analysis Report and Compliance Dashboard © What's Needed Hardening Solutions that doesn’t harm or stop the Services Operations Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access Easily p rovide Real Time Policies monitoring and implementation Unparalleled reporting capabilities on regulatory compliance Challenges What's Needed 1. Real time enforcement of an organization policies on the IT Infrastructure layers, without harming the Services Operation Hardening Solutions that doesn’t harm or stop the Services Operations 2. Protect and enforce the organization’s Policy Processes through verifying the User behavior Harden not only basic Objects but also ensure Applications proper utilization and regulate Policies Changes and Access 3. Monitor, alert and prevent policies break, rolling back to any change of the hardened element following the Policies Easily p rovide Real Time Policies monitoring and implementation 4. Be able to produce a wide range of regulatory reports, gap analysis, what if analysis and compliance dashboard Unparalleled reporting capabilities on regulatory compliance
  • 11. All of Those Through Automation Workflow Automation Engine NetIQ Products Message Bus, Resource Model, CMDB 3 rd Party Best-of-Breed products Run Books (Event Correlation, Fault Recovery, Routine Server Restarts, etc. ) Processes (ITIL Incident Management, Change Management, DR testing, etc.) Correlation Engine AM SM/CG SCM DRA SCOM HPOM Remedy Smarts Adapters Bi-directional data collection and control Activity Libraries Workflow building blocks that control other tools Process Templates Provides built-in knowledge Presentation Layer Consoles tailored to specific users Independent Engines Allow data processing scalability Resource Mgmt DB Normalizes data from diverse tools Ops Console Config Console Reports … …
  • 12. At The End This is What Really Counts
  • 13. Real World Example On Self Password Reset
  • 14.
  • 15.
  • 16.
  • 17.

Editor's Notes

  1. Level 1 – Focus on High Turnaround and Training Costs Level 3 are usually not fully onsite – This extend Time to Exposure Focus on reducing Time to Exposure Different Tools requires Different Skills and Different Training Focus on the Human Element – The human make mistakes by design © 2008 NetIQ Corporation. All rights reserved.
  2. © 2008 NetIQ Corporation. All rights reserved.